1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
50
51
52
53
54
55
56
57
58
59
60
61
62
63
64
65
66
67
68
69
70
71
72
73
74
75
76
77
78
79
80
81
82
83
84
85
86
87
88
89
90
91
92
93
|
// Copyright 2017 Yahoo Holdings. Licensed under the terms of the Apache 2.0 license. See LICENSE in the project root.
package com.yahoo.jdisc.http.server.jetty;
import com.google.inject.AbstractModule;
import com.google.inject.Module;
import com.google.inject.util.Modules;
import com.yahoo.container.logging.ConnectionLog;
import com.yahoo.jdisc.handler.RequestHandler;
import com.yahoo.jdisc.http.ConnectorConfig;
import com.yahoo.jdisc.http.ServerConfig;
import com.yahoo.jdisc.http.ServletPathsConfig;
import com.yahoo.jdisc.http.guiceModules.ConnectorFactoryRegistryModule;
import com.yahoo.jdisc.http.guiceModules.ServletModule;
import java.io.IOException;
import java.nio.file.Path;
/**
* @author Simon Thoresen Hult
* @author bjorncs
*/
public class TestDrivers {
public static TestDriver newConfiguredInstance(RequestHandler requestHandler,
ServerConfig.Builder serverConfig,
ConnectorConfig.Builder connectorConfig,
Module... guiceModules) throws IOException {
return TestDriver.newInstance(
JettyHttpServer.class,
requestHandler,
newConfigModule(serverConfig, connectorConfig, guiceModules));
}
public static TestDriver newInstance(RequestHandler requestHandler, Module... guiceModules) throws IOException {
return TestDriver.newInstance(
JettyHttpServer.class,
requestHandler,
newConfigModule(
new ServerConfig.Builder(),
new ConnectorConfig.Builder(),
guiceModules
));
}
public enum TlsClientAuth { NEED, WANT }
public static TestDriver newInstanceWithSsl(RequestHandler requestHandler,
Path certificateFile,
Path privateKeyFile,
TlsClientAuth tlsClientAuth,
Module... guiceModules) throws IOException {
return TestDriver.newInstance(
JettyHttpServer.class,
requestHandler,
Modules.override(
newConfigModule(
new ServerConfig.Builder().connectionLog(new ServerConfig.ConnectionLog.Builder().enabled(true)),
new ConnectorConfig.Builder()
.tlsClientAuthEnforcer(
new ConnectorConfig.TlsClientAuthEnforcer.Builder()
.enable(true)
.pathWhitelist("/status.html"))
.ssl(new ConnectorConfig.Ssl.Builder()
.enabled(true)
.clientAuth(tlsClientAuth == TlsClientAuth.NEED
? ConnectorConfig.Ssl.ClientAuth.Enum.NEED_AUTH
: ConnectorConfig.Ssl.ClientAuth.Enum.WANT_AUTH)
.privateKeyFile(privateKeyFile.toString())
.certificateFile(certificateFile.toString())
.caCertificateFile(certificateFile.toString()))))
.with(guiceModules));
}
private static Module newConfigModule(ServerConfig.Builder serverConfig,
ConnectorConfig.Builder connectorConfigBuilder,
Module... guiceModules) {
return Modules.combine(
new AbstractModule() {
@Override
protected void configure() {
bind(ServletPathsConfig.class).toInstance(new ServletPathsConfig(new ServletPathsConfig.Builder()));
bind(ServerConfig.class).toInstance(new ServerConfig(serverConfig));
bind(ConnectorConfig.class).toInstance(new ConnectorConfig(connectorConfigBuilder));
bind(FilterBindings.class).toInstance(new FilterBindings.Builder().build());
bind(ConnectionLog.class).toInstance(new VoidConnectionLog());
}
},
new ConnectorFactoryRegistryModule(connectorConfigBuilder),
new ServletModule(),
Modules.combine(guiceModules));
}
}
|